An active approach to detect and defend against peer-to-peer botnets. The aim of this project is to develop an effective defence system to help organisations detect and defend against the peer-to-peer (P2P) botnets. If this research is accomplished successfully, it will be a big step forward in defeating this new but devastating malicious software widely utilised by Internet criminals and terrorists. The capability of a nation to defend against the P2P botnet attacks on its information infrastru ....An active approach to detect and defend against peer-to-peer botnets. The aim of this project is to develop an effective defence system to help organisations detect and defend against the peer-to-peer (P2P) botnets. If this research is accomplished successfully, it will be a big step forward in defeating this new but devastating malicious software widely utilised by Internet criminals and terrorists. The capability of a nation to defend against the P2P botnet attacks on its information infrastructure is central to the control of such attacks and hence to a nation's long-term survival and prosperity. The outcomes of this project can be directly used in Australian research communities and adopted by industry and government agencies.Read moreRead less
Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and ....Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and inventing non-removable watermarks on AI models. The outcomes are new tools for securing AI-based FinTech systems before deployment and tools for IP violation forensics post-deployment. Such capabilities are beneficial by improving the security and safety of FinTech systems and other nationally critical AI systems.Read moreRead less
Enabling Anonymity and Privacy for Blockchain Technology in a Quantum World. Blockchain is a promising technology in the digital world today. However, existing approaches for enabling blockchain applications, particularly with privacy protection and anonymity, are vulnerable to quantum computer attacks. This project aims to enable novel cryptographic mechanisms together with their cryptographic libraries for protecting blockchain in the quantum world, hence, post-quantum secure blockchain. The e ....Enabling Anonymity and Privacy for Blockchain Technology in a Quantum World. Blockchain is a promising technology in the digital world today. However, existing approaches for enabling blockchain applications, particularly with privacy protection and anonymity, are vulnerable to quantum computer attacks. This project aims to enable novel cryptographic mechanisms together with their cryptographic libraries for protecting blockchain in the quantum world, hence, post-quantum secure blockchain. The expected outcomes of this project include innovative technologies, as well as secure and practical post-quantum protocols for protecting future blockchain applications. This will provide economic and social benefits to Australian industry through the enablement of advanced technologies which are developed in Australia.Read moreRead less
Semantic change detection through large-scale learning. This project aims to develop technologies which understand the content of images before higher-level analysis is performed. This approach is intended to allow more accurate and reliable decisions to be made using automated image analysis than has previously been possible. The project will particularly investigate the detection of change in the contents of an image.
Toward inclusive peace. Toward inclusive peace. This project will investigate how peace agreements can advance women’s rights and participation after post-conflict and political transitions. It will examine the relationship between women’s presence in peacemaking processes, women’s rights and gender provisions in peace agreements, and women’s participation in post-conflict governance of countries with successful peace agreements. Women’s participation in peace processes makes a successful peace ....Toward inclusive peace. Toward inclusive peace. This project will investigate how peace agreements can advance women’s rights and participation after post-conflict and political transitions. It will examine the relationship between women’s presence in peacemaking processes, women’s rights and gender provisions in peace agreements, and women’s participation in post-conflict governance of countries with successful peace agreements. Women’s participation in peace processes makes a successful peace agreement likelier, but may not consolidate peace or lead to greater participation by women in the governance of the country. Anticipated outcomes are analysis of the relationship between peace processes and gender equality in conflict-affected societies; improved consular delivery of aid programmes in fragile states; and targeted air delivery that empowers women.Read moreRead less
Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applic ....Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applications of pairings. The results will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users. It will also support many new product opportunities aligned with Motorola's business markets.Read moreRead less
Robust Defences against Adversarial Machine Learning for UAV Systems. This project aims to investigate robust defences for Unmanned Aerial Vehicle (UAV) systems to protect them against adversarial Machine Learning (ML) attacks. This project expects to generate new knowledge in the area of cybersecurity using innovative approaches to safeguard UAV systems from attacks that exploit vulnerabilities in ML models. The expected outcomes of this project include improve techniques for understanding and ....Robust Defences against Adversarial Machine Learning for UAV Systems. This project aims to investigate robust defences for Unmanned Aerial Vehicle (UAV) systems to protect them against adversarial Machine Learning (ML) attacks. This project expects to generate new knowledge in the area of cybersecurity using innovative approaches to safeguard UAV systems from attacks that exploit vulnerabilities in ML models. The expected outcomes of this project include improve techniques for understanding and developing robust ML models and enhanced capacity to design secure UAV systems. This should provide significant benefits, such as improving the security of UAV technology and increasing the reliable use of UAVs for transport and logistics services to support urban and regional communities in Australia.Read moreRead less
Integrated Financial Fraud Detection in Enterprise Applications. Fraud costs the Australian economy at least $3 billion per year. The incidence of fraud within the Australian economy is increasing. Australian entities are ill-prepared to detect and prevent fraud against their businesses with very few developing or implementing any form of fraud control strategy (AS 8001-2003). The growing use of the Internet by organisations for electronic commerce increases their exposure to fraudulent activiti ....Integrated Financial Fraud Detection in Enterprise Applications. Fraud costs the Australian economy at least $3 billion per year. The incidence of fraud within the Australian economy is increasing. Australian entities are ill-prepared to detect and prevent fraud against their businesses with very few developing or implementing any form of fraud control strategy (AS 8001-2003). The growing use of the Internet by organisations for electronic commerce increases their exposure to fraudulent activities. Inevitably much of the cost of fraud is passed on to the customers and the community at large. By providing large organisations with an approach to assist in detecting fraudulent behaviour in accounting systems, it is envisaged that this research will assist in reducing the impact of fraud on society.Read moreRead less
Understanding and Costing Offending Trajectories: Creating an Evidence-Base for Targeting Crime Prevention. The research will provide an evidence-base for targeting diversionary and crime prevention programs and for assessing their cost-effectiveness. Many of these programs have resulted in a range of beneficial outcomes and they are receiving increased government funding. By providing a better understanding of offending pathways, the research will enable programs to be targeted towards particul ....Understanding and Costing Offending Trajectories: Creating an Evidence-Base for Targeting Crime Prevention. The research will provide an evidence-base for targeting diversionary and crime prevention programs and for assessing their cost-effectiveness. Many of these programs have resulted in a range of beneficial outcomes and they are receiving increased government funding. By providing a better understanding of offending pathways, the research will enable programs to be targeted towards particular at-risk groups at crucial developmental phases. The innovative longitudinal costing method that will be developed and applied in the Queensland context will enable an assessment of the cost-effectiveness of diversionary and crime prevention programs. This will provide a sound empirical basis for directing scarce government resources.Read moreRead less
Regulation of neuronal cell death signalling for the treatment of neurodegenerative diseases. The progression of neurodegenerative diseases, such as Alzheimer's and motor neuron diseases, are often underpinned by neuronal cell death-signalling. This project aims to characterise molecules that regulate cell death signalling, thereby increasing our knowledge of how neuronal cell death can be inhibited.